default search action
Jiguo Li 0001
Person information
- affiliation: Fujian Normal University, College of Mathematics and Informatics, Fuzhou, China
- affiliation: Hohai University, College of Computer and Information, Nanjing, China
- affiliation (PhD): Harbin Institute of Technology, China
Other persons with the same name
- Jiguo Li — disambiguation page
- Jiguo Li 0002 — Chinese Academic of Sciences, Institute of Computer Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j123]Shaobo Chen, Jiguo Li, Yichen Zhang, Jinguang Han:
Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity. IEEE Internet Things J. 11(6): 10441-10451 (2024) - [j122]Shujun Wang, Jianting Ning, Shengmin Xu, Jiguo Li, Kai Zhang:
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions. IEEE Internet Things J. 11(20): 33940-33952 (2024) - [j121]Jinguang Han, Liqun Chen, Aiqun Hu, Liquan Chen, Jiguo Li:
Privacy-Preserving Decentralized Functional Encryption for Inner Product. IEEE Trans. Dependable Secur. Comput. 21(4): 1680-1694 (2024) - [j120]Chen Li, Jianting Ning, Shengmin Xu, Chao Lin, Jiguo Li, Jian Shen:
DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing. IEEE Trans. Inf. Forensics Secur. 19: 7744-7758 (2024) - [j119]Liqing Chen, Jiayi Li, Jiguo Li, Jian Weng:
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query. IEEE Trans. Inf. Forensics Secur. 19: 9910-9923 (2024) - [j118]Jinmei Tian, Yang Lu, Jiguo Li:
Lightweight Searchable and Equality-Testable Certificateless Authenticated Encryption for Encrypted Cloud Data. IEEE Trans. Mob. Comput. 23(8): 8431-8446 (2024) - 2023
- [j117]Liqing Chen, Jiayi Li, Jiguo Li:
Toward Forward and Backward Private Dynamic Searchable Symmetric Encryption Supporting Data Deduplication and Conjunctive Queries. IEEE Internet Things J. 10(19): 17408-17423 (2023) - [j116]Jiguo Li, Ruyuan Zhang, Yang Lu, Jinguang Han, Yichen Zhang, Wenzheng Zhang, Xinfeng Dong:
Multiauthority Attribute-Based Encryption for Assuring Data Deletion. IEEE Syst. J. 17(2): 2029-2038 (2023) - [j115]Qihong Yu, Jiguo Li, Jian Shen:
ID-Based Ring Signature against Continual Side Channel Attack. Symmetry 15(1): 179 (2023) - [j114]Peng Yi, Jiguo Li, Yichen Zhang, Yu Chen:
Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System. IEEE Trans. Aerosp. Electron. Syst. 59(2): 1292-1299 (2023) - [j113]Yuyan Guo, Zhenhua Lu, Hui Ge, Jiguo Li:
Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage. IEEE Trans. Computers 72(7): 1901-1912 (2023) - [j112]Yang Lu, Jiguo Li:
Privacy-Preserving and Forward Public Key Encryption With Field-Free Multi-Keyword Search for Cloud Encrypted Data. IEEE Trans. Cloud Comput. 11(4): 3619-3630 (2023) - [j111]Zhaozhe Kang, Jiguo Li, Jian Shen, Jinguang Han, Yuting Zuo, Yichen Zhang:
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size. IEEE Trans. Knowl. Data Eng. 35(9): 9514-9530 (2023) - 2022
- [j110]Jiguo Li, Yu Chen, Jinguang Han, Chengdong Liu, Yichen Zhang, Huaqun Wang:
Decentralized Attribute-Based Server-Aid Signature in the Internet of Things. IEEE Internet Things J. 9(6): 4573-4583 (2022) - [j109]Ruyuan Zhang, Jiguo Li, Yang Lu, Jinguang Han, Yichen Zhang:
Key escrow-free attribute based encryption with user revocation. Inf. Sci. 600: 59-72 (2022) - [j108]Qihong Yu, Jiguo Li, Sai Ji:
Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience. Secur. Commun. Networks 2022: 8220259:1-8220259:12 (2022) - [j107]Chenbin Zhao, Li Xu, Jiguo Li, He Fang, Yinghui Zhang:
Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy. IEEE Syst. J. 16(3): 4804-4815 (2022) - [j106]Ningyu Chen, Jiguo Li, Yichen Zhang, Yuyan Guo:
Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage. IEEE Trans. Computers 71(1): 175-184 (2022) - [j105]Jiguo Li, Hao Yan, Yichen Zhang:
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage. IEEE Trans. Cloud Comput. 10(1): 356-365 (2022) - [j104]Jiguo Li, Yichen Zhang, Jianting Ning, Xinyi Huang, Geong Sen Poh, Debang Wang:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Trans. Cloud Comput. 10(2): 762-773 (2022) - [j103]Feng Wang, Li Xu, Jiguo Li, Kim-Kwang Raymond Choo:
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage. IEEE Trans. Cloud Comput. 10(4): 2704-2716 (2022) - [j102]Yang Lu, Jiguo Li:
Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices. IEEE Trans. Mob. Comput. 21(12): 4397-4409 (2022) - [j101]Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Raymond Choo, Jiangtao Li:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Trans. Serv. Comput. 15(1): 567-587 (2022) - [j100]Yu Chen, Jiguo Li, Chengdong Liu, Jinguang Han, Yichen Zhang, Peng Yi:
Efficient Attribute Based Server-Aided Verification Signature. IEEE Trans. Serv. Comput. 15(6): 3224-3232 (2022) - 2021
- [j99]Jiguo Li, Min Wang, Yang Lu, Yichen Zhang, Huaqun Wang:
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack. Comput. Stand. Interfaces 74: 103471 (2021) - [j98]Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen:
An efficient identity-based signature scheme with provable security. Inf. Sci. 576: 790-799 (2021) - [j97]Jiguo Li, Hao Yan, Yichen Zhang:
Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage. IEEE Syst. J. 15(1): 577-585 (2021) - [j96]Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Jiguo Li, Hongwei Li, Jian-Feng Ma:
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans. Dependable Secur. Comput. 18(3): 1080-1094 (2021) - [j95]Jiguo Li, Ningyu Chen, Yichen Zhang:
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing. IEEE Trans. Emerg. Top. Comput. 9(2): 983-993 (2021) - [j94]Yang Lu, Jiguo Li, Fen Wang:
Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs. IEEE Trans. Ind. Informatics 17(4): 2696-2706 (2021) - [j93]Jiguo Li, Hao Yan, Yichen Zhang:
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 71-81 (2021) - [j92]Yang Lu, Jiguo Li, Yichen Zhang:
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks. IEEE Trans. Serv. Comput. 14(6): 2041-2054 (2021) - [c15]Quanru Chen, Jinguang Han, Jiguo Li, Liquan Chen, Song Li:
A Privacy-Preserving Logistics Information System with Traceability. CSS 2021: 145-163 - [i5]Quanru Chen, Jinguang Han, Jiguo Li, Liquan Chen, Song Li:
A Privacy-Preserving Logistics Information System with Traceability. CoRR abs/2109.05216 (2021) - 2020
- [j91]Chen Shen, Yang Lu, Jiguo Li:
Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups. IEEE Access 8: 93-103 (2020) - [j90]Feng Wang, Li Xu, Kim-Kwang Raymond Choo, Yuexin Zhang, Huaqun Wang, Jiguo Li:
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage. IEEE Access 8: 2258-2271 (2020) - [j89]Yang Lu, Jiguo Li, Yichen Zhang:
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT. IEEE Internet Things J. 7(4): 2553-2562 (2020) - [j88]Liqing Chen, Jiguo Li, Yang Lu, Yichen Zhang:
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service. Inf. Sci. 538: 273-289 (2020) - [j87]Yuyan Guo, Jiguo Li, Mingming Jiang, Lei Yu, Shimin Wei:
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model. Secur. Commun. Networks 2020: 1492681:1-1492681:11 (2020) - [j86]Hao Yan, Jiguo Li, Yichen Zhang:
Remote Data Checking With a Designated Verifier in Cloud Storage. IEEE Syst. J. 14(2): 1788-1797 (2020) - [j85]Jiguo Li, Shengzhou Hu, Yichen Zhang, Jinguang Han:
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation. Soft Comput. 24(3): 1869-1882 (2020) - [j84]Liqing Chen, Jiguo Li, Yichen Zhang:
Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. Soft Comput. 24(6): 4589-4606 (2020) - [j83]Liqing Chen, Jiguo Li, Yichen Zhang:
Anonymous Certificate-Based Broadcast Encryption With Personalized Messages. IEEE Trans. Broadcast. 66(4): 867-881 (2020) - [j82]Jian Shen, Anxi Wang, Chen Wang, Jiguo Li, Yan Zhang:
Content-Centric Group User Authentication for Secure Social Networks. IEEE Trans. Emerg. Top. Comput. 8(3): 833-844 (2020) - [j81]Jiguo Li, Yao Wang, Yichen Zhang, Jinguang Han:
Full Verifiability for Outsourced Decryption in Attribute Based Encryption. IEEE Trans. Serv. Comput. 13(3): 478-487 (2020) - [j80]Jiguo Li, Yichen Zhang:
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs. Wirel. Pers. Commun. 111(2): 1255-1269 (2020)
2010 – 2019
- 2019
- [j79]Yang Lu, Jiguo Li, Yichen Zhang:
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search. IEEE Access 7: 40878-40892 (2019) - [j78]Yichen Zhang, Jiguo Li, Hao Yan:
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure. IEEE Access 7: 47982-47990 (2019) - [j77]Shengzhou Hu, Jiguo Li, Yichen Zhang:
A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation. IEEE Access 7: 84866-84875 (2019) - [j76]Chenbin Zhao, Li Xu, Jiguo Li, Feng Wang, He Fang:
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage. IEEE Access 7: 160459-160471 (2019) - [j75]Yang Lu, Jiguo Li:
Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust. Comput. 22(1): 285-299 (2019) - [j74]Yang Lu, Quanling Zhang, Jiguo Li:
A certificate-based AKA protocol secure against public key replacement attacks. Int. Arab J. Inf. Technol. 16(4): 754-765 (2019) - [j73]Yang Lu, Jiguo Li:
Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks. Int. J. Commun. Syst. 32(3) (2019) - [j72]Jiguo Li, Qihong Yu, Yichen Zhang, Jian Shen:
Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470: 175-188 (2019) - [j71]Yang Lu, Gang Wang, Jiguo Li:
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. Inf. Sci. 479: 270-276 (2019) - [j70]Jiguo Li, Qihong Yu, Yichen Zhang:
Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 484: 113-134 (2019) - [j69]Yang Lu, Jiguo Li:
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. KSII Trans. Internet Inf. Syst. 13(3): 1502-1522 (2019) - [j68]Liqing Chen, Jiguo Li, Yichen Zhang:
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. KSII Trans. Internet Inf. Syst. 13(3): 1523-1545 (2019) - [j67]Yang Lu, Jiguo Li:
Constructing pairing-free certificateless public key encryption with keyword search. Frontiers Inf. Technol. Electron. Eng. 20(8): 1049-1060 (2019) - [j66]Yinbin Miao, Ximeng Liu, Robert H. Deng, Hongjun Wu, Hongwei Li, Jiguo Li, Dapeng Wu:
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things. IEEE Trans. Ind. Informatics 15(6): 3206-3217 (2019) - 2018
- [j65]Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and Improvement for Certificateless Aggregate Signature. Fundam. Informaticae 157(1-2): 111-123 (2018) - [j64]Jiguo Li, Qihong Yu, Yichen Zhang:
Identity-based broadcast encryption with continuous leakage resilience. Inf. Sci. 429: 177-193 (2018) - [j63]Jiguo Li, Liqing Chen, Yang Lu, Yichen Zhang:
Anonymous certificate-based broadcast encryption with constant decryption cost. Inf. Sci. 454-455: 110-127 (2018) - [j62]Yang Lu, Gang Wang, Jiguo Li:
On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme. Inf. Technol. Control. 47(1): 56-62 (2018) - [j61]Shengzhou Hu, Jiguo Li, Yichen Zhang:
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption. KSII Trans. Internet Inf. Syst. 12(10): 5100-5119 (2018) - [j60]Jiguo Li, Shengzhou Hu, Yichen Zhang:
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key. Secur. Commun. Networks 2018: 8738960:1-8738960:10 (2018) - [j59]Jiguo Li, Wei Yao, Jinguang Han, Yichen Zhang, Jian Shen:
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage. IEEE Syst. J. 12(2): 1767-1777 (2018) - [j58]Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen:
Expressive attribute-based keyword search with constant-size ciphertext. Soft Comput. 22(15): 5163-5177 (2018) - [j57]Yuyan Guo, Jiguo Li, Yang Lu, Yichen Zhang, Futai Zhang:
Provably secure certificate-based encryption with leakage resilience. Theor. Comput. Sci. 711: 1-10 (2018) - 2017
- [j56]Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, Xiong Li:
Hierarchical Trust Level Evaluation for Pervasive Social Networking. IEEE Access 5: 1178-1187 (2017) - [j55]Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
Efficient designated server identity-based encryption with conjunctive keyword search. Ann. des Télécommunications 72(5-6): 359-370 (2017) - [j54]Yang Lu, Jiguo Li:
Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. Adv. Math. Commun. 11(1): 161-177 (2017) - [j53]Yang Lu, Jiguo Li, Jian Shen:
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. Comput. J. 60(12): 1729-1744 (2017) - [j52]Jiguo Li, Yuerong Shi, Yichen Zhang:
Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int. J. Commun. Syst. 30(1) (2017) - [j51]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing. Int. J. Sens. Networks 24(1): 62-73 (2017) - [j50]Yang Lu, Quanling Zhang, Jiguo Li, Jian Shen:
An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing. Inf. Technol. Control. 46(3): 345-359 (2017) - [j49]Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks. KSII Trans. Internet Inf. Syst. 11(7): 3629-3647 (2017) - [j48]Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Secur. Commun. Networks 2017: 3596205:1-3596205:11 (2017) - [j47]Hao Yan, Jiguo Li, Jinguang Han, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(1): 78-88 (2017) - [j46]Jiguo Li, Xiaonan Lin, Yichen Zhang, Jinguang Han:
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage. IEEE Trans. Serv. Comput. 10(5): 715-725 (2017) - [j45]Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian, Jinguang Han:
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Trans. Serv. Comput. 10(5): 785-796 (2017) - 2016
- [j44]Jiguo Li, Na Qian, Yichen Zhang, Xinyi Huang:
An Efficient Certificate-Based Designated Verifier Signature Scheme. Comput. Informatics 35(5): 1210-1230 (2016) - [j43]Jiguo Li, Haiting Du, Yichen Zhang:
Certificate-Based Key-Insulated Signature in the Standard Model. Comput. J. 59(7): 1028-1039 (2016) - [j42]Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu:
A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. Comput. J. 59(7): 1066-1075 (2016) - [j41]Yang Lu, Jiguo Li:
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. 62: 140-147 (2016) - [j40]Yang Lu, Jiguo Li:
Improved certificate-based signature scheme without random oracles. IET Inf. Secur. 10(2): 80-86 (2016) - [j39]Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon Yuen, Jiguo Li, Jie Cao:
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption. Inf. Sci. 345: 143-155 (2016) - [j38]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang, Futai Zhang:
Continuous leakage-resilient certificate-based encryption. Inf. Sci. 355-356: 1-14 (2016) - [j37]Yang Lu, Quanling Zhang, Jiguo Li, Jian Shen:
Comment on a certificateless one-pass and two-party authenticated key agreement protocol. Inf. Sci. 369: 184-187 (2016) - [j36]Yang Lu, Jiguo Li:
A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model. Inf. Sci. 372: 745-757 (2016) - [j35]Jiguo Li, Haiping Wang, Yichen Zhang, Jian Sheng:
Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Trans. Internet Inf. Syst. 10(7): 3339-3352 (2016) - [j34]Jiguo Li, Xuexia Zhao, Yichen Zhang, Wei Yao:
Provably Secure Certificate-based Conditional Proxy Re-encryption. J. Inf. Sci. Eng. 32(4): 813-830 (2016) - [j33]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-based encryption resilient to key leakage. J. Syst. Softw. 116: 101-112 (2016) - [j32]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang:
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Secur. Commun. Networks 9(10): 1016-1024 (2016) - [j31]Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen:
Hierarchical attribute-based encryption with continuous auxiliary inputs leakage. Secur. Commun. Networks 9(18): 4852-4862 (2016) - [j30]Ye Yang, Jinguang Han, Willy Susilo, Tsz Hon Yuen, Jiguo Li:
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts. Secur. Commun. Networks 9(18): 5003-5015 (2016) - [j29]Yang Lu, Jiguo Li:
Provably secure certificateless proxy signature scheme in the standard model. Theor. Comput. Sci. 639: 42-59 (2016) - [c14]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing. ICCCS (1) 2016: 389-408 - [i4]Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. IACR Cryptol. ePrint Arch. 2016: 692 (2016) - 2015
- [j28]Yang Lu, Quanling Zhang, Jiguo Li:
An improved certificateless strong key-insulated signature scheme in the standard model. Adv. Math. Commun. 9(3): 353-373 (2015) - [j27]Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou:
A Forward-Secure Certificate-Based Signature Scheme. Comput. J. 58(4): 853-866 (2015) - [j26]Huiling Qian, Jiguo Li, Yichen Zhang, Jinguang Han:
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Sec. 14(6): 487-497 (2015) - [j25]Yichen Zhang, Jiguo Li, Na Qian:
无证书强指定验证者签名方案 (Certificateless Strong Designated Verifier Signature Scheme). 计算机科学 42(3): 132-135 (2015) - [j24]Jiguo Li, Jingjing Zhao, Yichen Zhang:
Certificateless online/offline signcryption scheme. Secur. Commun. Networks 8(11): 1979-1990 (2015) - [j23]Qihong Yu, Jiguo Li, Yichen Zhang:
Leakage-resilient certificate-based encryption. Secur. Commun. Networks 8(18): 3346-3355 (2015) - [c13]Huaqun Wang, Jiguo Li:
Private Certificate-Based Remote Data Integrity Checking in Public Clouds. COCOON 2015: 575-586 - [i3]Yang Lu, Quanling Zhang, Jiguo Li:
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction. IACR Cryptol. ePrint Arch. 2015: 256 (2015) - [i2]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. IACR Cryptol. ePrint Arch. 2015: 314 (2015) - 2014
- [j22]Jiguo Li, Haiting Du, Yichen Zhang, Tao Li, Yuexin Zhang:
Provably secure certificate-based key-insulated signature scheme. Concurr. Comput. Pract. Exp. 26(8): 1546-1560 (2014) - [j21]Yang Lu, Jiguo Li:
Efficient constructions of certificate-based key encapsulation mechanism. Int. J. Internet Protoc. Technol. 8(2/3): 96-106 (2014) - [j20]Yang Lu, Jiguo Li:
Provably Secure Certificate-Based Signcryption Scheme without Pairings. KSII Trans. Internet Inf. Syst. 8(7): 2554-2571 (2014) - [j19]Yang Lu, Jiguo Li:
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model. J. Inf. Sci. Eng. 30(5): 1553-1568 (2014) - [c12]Jiguo Li, Xuexia Zhao, Yichen Zhang:
Certificate-Based Conditional Proxy Re-Encryption. NSS 2014: 299-310 - 2013
- [j18]Yang Lu, Jiguo Li:
New forward-secure public-key encryption without random oracles. Int. J. Comput. Math. 90(12): 2603-2613 (2013) - [j17]Jiguo Li, Zhiwei Wang, Yichen Zhang:
Provably secure certificate-based signature scheme without pairings. Inf. Sci. 233: 313-320 (2013) - [j16]Ji Yao, Jiguo Li, Yichen Zhang:
Certificate-Based Encryption Scheme without Pairing. KSII Trans. Internet Inf. Syst. 7(6): 1480-1491 (2013) - [j15]Jiguo Li, Yanqiong Li, Yichen Zhang:
Provably Secure Forward Secure Certificateless Proxy Signature Scheme. KSII Trans. Internet Inf. Syst. 7(8): 1972-1988 (2013) - [j14]Zhong-Mei Wan, Jiguo Li, Xuan Hong:
Parallel key-insulated signature scheme without random oracles. J. Commun. Networks 15(3): 252-257 (2013) - [c11]Huiling Qian, Jiguo Li, Yichen Zhang:
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. ICICS 2013: 363-372 - [c10]Jiguo Li, Yanqiong Li, Yichen Zhang:
Forward Secure Certificateless Proxy Signature Scheme. NSS 2013: 350-364 - 2012
- [j13]Jiguo Li, Xinyi Huang, Meixue Hong, Yichen Zhang:
Certificate-based signcryption with enhanced security features. Comput. Math. Appl. 64(6): 1587-1601 (2012) - [j12]Yang Lu, Jiguo Li:
Generic Construction of Forward-Secure Identity-Based Encryption. J. Comput. 7(12): 3068-3074 (2012) - [j11]Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2): 314-322 (2012) - [c9]Jiguo Li, Yichen Zhang, Huiyun Teng:
A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. CSS 2012: 362-376 - [c8]Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, Yuexin Zhang:
Certificate-Based Key-Insulated Signature. ICDKE 2012: 206-220 - 2011
- [j10]Zhong-Mei Wan, Jian Weng, Xuejia Lai, Shengli Liu, Jiguo Li:
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption. J. Inf. Sci. Eng. 27(1): 243-259 (2011) - [j9]Yang Lu, Jiguo Li:
A Practical Forward-Secure Public-Key Encryption Scheme. J. Networks 6(9): 1254-1261 (2011) - [i1]Yang Lu, Jiguo Li:
Certificate-Based Signcryption: Security Model and Efficient Construction. IACR Cryptol. ePrint Arch. 2011: 542 (2011) - 2010
- [j8]Zhong-Mei Wan, Jian Weng, Jiguo Li:
Security Mediated Certificateless Signatures Without Pairing. J. Comput. 5(12): 1862-1869 (2010) - [j7]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu:
Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3): 421-449 (2010) - [j6]Yang Lu, Jiguo Li:
Forward-Secure Certificate-Based Encryption and its Generic Construction. J. Networks 5(5): 527-534 (2010)
2000 – 2009
- 2009
- [j5]Yang Lu, Jiguo Li, Junmo Xiao:
Constructing Efficient Certificate-based Encryption with Paring. J. Comput. 4(1): 19-26 (2009) - [j4]Jiguo Li, Lizhong Xu, Yichen Zhang:
Provably Secure Certificate-based Proxy Signature Schemes. J. Comput. 4(6): 444-452 (2009) - [j3]Yang Lu, Jiguo Li, Junmo Xiao:
Threshold Certificate-based Encryption. J. Softw. 4(3): 210-217 (2009) - [c7]Yang Lu, Jiguo Li:
Forward-Secure Certificate-Based Encryption. IAS 2009: 57-60 - 2008
- [j2]Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu:
Cryptanalysis and improvement of an efficient certificateless signature scheme. J. Commun. Networks 10(1): 10-17 (2008) - [c6]Yang Lu, Jiguo Li:
A General and Secure Certification-based Encryption Construction. ChinaGrid 2008: 182-189 - [c5]Yang Lu, Jiguo Li, Junmo Xiao:
Generic Construction of Certificate-Based Encryption. ICYCS 2008: 1589-1594 - [c4]Yang Lu, Jiguo Li, Junmo Xiao:
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. ISECS 2008: 296-300 - 2007
- [c3]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu:
Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI 2007: 110-125 - 2006
- [c2]Jiguo Li, Yichen Zhang, Zhijian Wang:
Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ICICIC (1) 2006: 480-483 - 2004
- [c1]Jiguo Li, Yichen Zhang, Yuelong Zhu:
Security analysis and improvement of some proxy signature schemes. InfoSecu 2004: 27-32 - 2003
- [j1]Jiguo Li, Zhenfu Cao, Yichen Zhang:
Nonrepudiable Proxy Multi-Signature Scheme. J. Comput. Sci. Technol. 18(3): 399-402 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint